Easy-to-use abstraction over authentication.
Servers only store public keys, if/when the server is compromised the attacker cannot do anything with them.
Uniauth daemons can do anything, from being completely autonomous to using a hardware authenticator.
The application-daemon protocol supports any algorithm with a signature under 256 bytes long, but currently only ed25519 is implemented.
It is advised to serialize keys using 16-bit lengths for potential compatibility with large keys like RSA.